Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
The Department of Homeland Security already has real-time access to biometric data maintained in the FBI\'s huge database of criminal records. Within the next year, it\'ll be able to share similar data with the Defense Department.
In case of a government shutdown, federal employees will be barred from entering their workplace, using their smartphones or laptops, and accessing email and collaboration tools. “People who work despite what you tell them will…
The agency and the CIO Council creates a list of the competencies cybersecurity workers need. OPM\'s Kichak said agencies will have a common understanding of the skills and abilities these employees need.
Gen. Keith Alexander, commander of the military\'s new Cyber Command and the director of the NSA, said DoD can help protect private networks from cyber attack - especially critical infrastructure - without infringing on civil liberties. He said civilian agencies and private network operators could leverage NSA\'s capabilities without having the spy agency be in charge of security.
The administration\'s IT agenda for fiscal 2012 will include new tools to combat cyber threats as well as major overhauls to how agencies manage their systems. Agency CIOs say agility will be important moving forward.
February 28th and March 2nd, 2011 Conversation with Authors Series with Professor Scott Overmyer: A Conversation on Implementing Telework: Lessons learned from Four Federal Agencies
The National Endowment for the Humanities doesn’t use cloud computing outside of a test environment currently but Brett Bobley, the agency’s chief information officer, is looking to change that. He tells Federal News Radio one of his main priorities is pinpointing areas where the agency can use cloud computing to increase efficiency and save money. [...]
The Office of Personnel Management has officially defined what it means to be a federal IT security worker.
VA CIO Roger Baker says Government IT systems are at increased risk to inside and outside threats because many agencies don\'t have a centralized budget or operational authority over their IT systems.
Government IT systems are at increased risk to inside and outside threats because departments lack centralized budget and operational authority over their IT systems, says Roger Baker.
In the Recovery Operations Center, a cadre of analysts pore over millions of records of data looking for early warning signs of fraud in the $862 billion stimulus program. Chairman of the RAT Board, Earl Devaney explains the program.
OMB mandated departments implement continuous monitoring of their cyber networks by 2012. Part of meeting that goal is understanding what hardware and software currently reside on the computing backbone.
The service says it\'s getting closer to determining the path forward for issuing smartphones to soldiers in the field. It\'s something the service says could eventually provide warfighters with an all-in-one platform for training, battlefield communications and more.
Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.